Performance Analysis of Joint Entropy DLDDoS Attack Detection

Performance Analysis of Joint Entropy DLDDoS Attack Detection

Performance Analysis of Joint Entropy Deep Learning DDoS Attack Detection

Implementation Plan:
—————————

Step 1: Initially, we will construct an SDN based network topology consisting of 30 Hosts, 6 OpenFlow Switches and 1 POX Controller.

Step 2: Next, we inject the Inject SYN Flood, ICMP Flood, UDP Flood using hping3, Capture flow and simulate using CICIDS2017 dataset then collect network traffic data.

Step 3: Next, we compute the max and min of entropy values, entropy mean and standard deviation based on Joint Entropy with sliding window Technique, compute confidence intervals and store them in the output as a matrix using collected data.

Step 4: Next, we compute the intercept values by the dynamic threshold using SVM intercept, entropy statistics and sliding window and store the output based on collected data.

Step 5: Next, We perform attack classification using the Hybrid CNN-SVM based on Collected Data and calculated outputs.

Step 6: Finally Plot the performance Metrics:

6.1: Number of Epochs Vs. Accuracy (%)

6.2: Number of Epochs Vs. Precision (%)

6.3: Number of Epochs Vs. Recall (%)

6.4: Number of Epochs Vs. F1 Score (%)

6.5: Number of Epochs Vs. False Negative Rate (%)

Software requirement:
—————————

1. Development Tool:

i) Mininet-2.0 or Above Version

ii) Python-2.7 or Above version

iii) Wireshark [If needed]

2. Operating System:

i) Ubuntu 16.04 LTS (64-bit) or Above

Dataset:
———-

Link : https://www.kaggle.com/datasets/sweety18/cicids2017-full-dataset

Note:
——–

1) If the proposed plan does not fully align with your requirements, please provide all necessary details—including steps, parameters, models, and expected outcomes—in advance.

2) Kindly ensure that any missing configurations or specifications are clearly outlined in the plan before confirming.

3) If there’s no built-in solution for what the project needs, we can always turn to reference models, customize our own, different math models or write the code ourselves to fulfil the process.

4) If the plan satisfies your requirement, Please confirm with us.

5) Project based on Simulation only.

6) If you have any dataset to change, kindly provide us before confirming our dataset.

Live Tasks
Technology Ph.D MS M.Tech
NS2 75 117 95
NS3 98 119 206
OMNET++ 103 95 87
OPNET 36 64 89
QULANET 30 76 60
MININET 71 62 74
MATLAB 96 185 180
LTESIM 38 32 16
COOJA SIMULATOR 35 67 28
CONTIKI OS 42 36 29
GNS3 35 89 14
NETSIM 35 11 21
EVE-NG 4 8 9
TRANS 9 5 4
PEERSIM 8 8 12
GLOMOSIM 6 10 6
RTOOL 13 15 8
KATHARA SHADOW 9 8 9
VNX and VNUML 8 7 8
WISTAR 9 9 8
CNET 6 8 4
ESCAPE 8 7 9
NETMIRAGE 7 11 7
BOSON NETSIM 6 8 9
VIRL 9 9 8
CISCO PACKET TRACER 7 7 10
SWAN 9 19 5
JAVASIM 40 68 69
SSFNET 7 9 8
TOSSIM 5 7 4
PSIM 7 8 6
PETRI NET 4 6 4
ONESIM 5 10 5
OPTISYSTEM 32 64 24
DIVERT 4 9 8
TINY OS 19 27 17
TRANS 7 8 6
OPENPANA 8 9 9
SECURE CRT 7 8 7
EXTENDSIM 6 7 5
CONSELF 7 19 6
ARENA 5 12 9
VENSIM 8 10 7
MARIONNET 5 7 9
NETKIT 6 8 7
GEOIP 9 17 8
REAL 7 5 5
NEST 5 10 9
PTOLEMY 7 8 4

Related Pages

Workflow

YouTube Channel

Unlimited Network Simulation Results available here.

Related Topics